Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Re:Business problem != technology problem (Score 1) 343

by rwiggers (#49079027) Attached to: Ask Slashdot: Version Control For Non-Developers?

We've been using TortoiseSVN and SVN for some time here with a very good success for non SW development areas.

We've been using it with hardware schematics and layouts, as well as product documentation, with various levels of people using. Just don't forget to set "needs lock" as a default property, since most files are binary.

Also, we have a IT infrastructure team that uses SVN themselves, so we don't need to worry about servers and our products have software and we use it for sw/fw as well. So we (sw/fw developers) act as first-level support.

+ - BMW Cars Found Vulnerable In Connected Drive Hack->

Submitted by itwbennett
itwbennett writes: A security vulnerability in BMW's Connected Drive system allowed researchers to imitate BMW servers and send remote unlocking instructions to vehicles. The auto maker has already started sending out software patches to the 2.2 million cars equipped with Connected Drive and said it hadn't come across any cases in which the vulnerability had been used to unlock or attempt to unlock its cars.
Link to Original Source

Comment: Re:I feel safer with NSA than Google (Score 1) 281

by rwiggers (#48601217) Attached to: Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services

Yes, you're not. It was meant to show that NSA may be sharing that data with "private partners". You'll never be sure.

Conspiracy theorists will believe anything, agreed. They also like to post things as facts. But this has been partly proven, and a full prove will probably never appear.
Since I don't like conspiracy theories, I made clear the fact it's not completely proven...

Comment: Re:I feel safer with NSA than Google (Score 1) 281

by rwiggers (#48600685) Attached to: Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services

Are you serious? As not "selling" it to promote unfair competition in favor of some white house supporters?
If you search you'll see various companies had secret data searched and stored by NSA, oil&gas has a lot of examples. It's believed that this data has been used b some companies as an advantage on international biddings...

+ - Microsoft's age-old image library 'Clip Art' is no more->

Submitted by hypnosec
hypnosec writes: Microsoft has finally bid a goodbye to the age-old Clip Art image library found in its Office products as its usage has been declining over the years. Redmond replaced the Clip Art’s online image library with Bing Image Search. This means that people searching for online images inside an Office app will now be directed to a gallery powered by Bing Images that will bring in results from around the web. Bing's copyright filter based on the Creative Commons licensing system will let users get royalty-free images which they can use, share, or modify for either personal or commercial use.
Link to Original Source

Comment: Re:Comment from a Chemist (Score 1) 432

by rwiggers (#47091773) Attached to: Has the Ethanol Threat Manifested In the US?

Ethanol, as produced in Brazil, doesn't need to (but most probably uses, since biodiesel here is more expensive than regular diesel).
Even using diesel, amounts are small compared to energy production, crops are near the distillery.
The distillery itself has a positive energy balance, not including the ethanol it delivers (co-generation, using heat to produce power). Heat comes from burning the biomass byproducts.
For example, one ethanol producer in Brazil states in it's page an capacity of 940MW to be sold.
Some short info on Petrobras production of biodiesel:

+ - Net Neutrality legislation approved.

Submitted by rwiggers
rwiggers writes: Known as the Marco Civil — or Bill of Rights — it would enshrine freedom of expression, the right to privacy and the principle of web neutrality. This could be understood as a response from the president Dilma to the NSA spying on her and is expected to be sanctioned soon.
Some aspects are quite interesting, content can only be removed by judicial order, net neutrality is written in law ans ISPs must take action to ensure privacy of communications.

Comment: Re:Side Show and a Game Changer (Score 1) 199

by rwiggers (#45659011) Attached to: Affordable 3D Metal Printer Developed Based on RepRap

I wouldn't count on it taking any job from a CNC machine. it's a MIG welding machine and it's resolution/accuracy should be well over 1mm. It won't deal with a lot of metal also.
No, it's not the one size fits all.
It's very useful and interesting, allowing complex geometries more easily and I think local shops will have one once the techs (his and other techs for metal 3D printing) are mature.

Comment: Re:Ubiquitous internet actually makes this worse (Score 1) 66

by rwiggers (#43544631) Attached to: Thousands of SCADA, ICS Devices Exposed Through Serial Ports

Those things are usually installed by engineers with very little knowledge/concern about security. In my field there's an urge for bluetooth connectivity for the industrial equipments, with all the security nightmares bluetooth poses on accessing a device. Wi-fi could be used with a much better security model, but it's considered too complicated...

Comment: Re:Dying gasps (Score 1) 535

by rwiggers (#42517279) Attached to: C Beats Java As Number One Language According To TIOBE Index

I've made embedded programming in C++, in a rather efficient way. It makes a lot of things easier, but it's much harder to find someone that knows what that thing is doing. If you handle a task to an experienced C++ programmer and say no use of new, delete and exception handling are allowed, probably the task won't get accomplished unless it's very simple.
I used to advocate the use o C++ on embedded, but gave up. In a larger environment with programmers of different experience levels, C is much easier to get running.

Comment: Re:Legacy Code is not the issue here (Score 1) 360

by rwiggers (#41750195) Attached to: Ask Slashdot: How To Avoid Working With Awful Legacy Code?

Hit the nail.
If you have at least a little experience, you've already at least once gone through the codebase and asked who's the idiot that wrote that, checked the answer on the version control system to find that the idiot is yourself.
On the other hand, sometimes the legacy code is so much patched that it's easier and faster to rewrite it. If this code is that much patched that you can't even follow the code flow anymore, bugs left are only the scary ones anyway. Rewriting that code is a high risk task, since many errors already solved will be done again, but may still be worth it.

...there can be no public or private virtue unless the foundation of action is the practice of truth. - George Jacob Holyoake